Definition Categories:
Hardware | Software | Security | Network | Internet | Coding

- Hardware -

Word Definition Citation
Yottabyte 2 to the 80th power bytes, which is approximately 10 to the 24th power (1,000,000,000,000,000,000,000,000) bytes. A yottabyte is equal to 1,024 zettabytes. Webopedia.com
Bus A collection of wires through which data is transmitted from one part of a computer to another. You can think of a bus as a highway on which data travels within a computer. webopedia.com
CPU Abbreviation of central processing unit, and pronounced as separate letters. The CPU is the brains of the computer. Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place. webopedia.com
NIC an expansion board you insert into a computer so the computer can be connected to a network. Most NICs are designed for a particular type of network, protocol, and media, although some can serve multiple networks. webopedia.com
Parallel Parallel means the device is capable of receiving more than one bit at a time webopedia.com
Serial One by one. Serial data transfer refers to transmitting data one bit at a time. The opposite of serial is parallel, in which several bits are transmitted concurrently. webopedia.com
SCSI Short for small computer system interface, a parallel interface standard used by Apple Macintosh computers, PCs, and many UNIX systems for attaching peripheral devices to computers. webopedia.com
RS232 Short for recommended standard-232C, a standard interface approved by the Electronic Industries Alliance (EIA) for connecting serial devices. webopedia.com
USB Short for Universal Serial Bus, an external bus standard that supports data transfer rates of 12 Mbps. A single USB port can be used to connect up to 127 peripheral devices, such as mice, modems, and keyboards webopedia.com
Firewire A very fast external bus standard that supports data transfer rates of up to 400Mbps (in 1394a) and 800Mbps (in 1394b). webopedia.com
Hard drive The mechanism that reads and writes data on a hard disk. webopedia.com
Floppy drive Short for floppy disk drive (FDD), a disk drive that can read and write to floppy disks. webopedia.com
CD-ROM/RW drive A machine that reads data from and writes data onto a disk. A disk drive rotates the disk very fast and has one or more heads that read and write data. webopedia.com
SIMM Acronym for single in-line memory module, a small circuit board that can hold a group of memory chips. Typically, SIMMs hold up to eight (on Macintoshes) or nine (on PCs) RAM chips. On PCs, the ninth chip is often used for parity error checking. Unlike memory chips, SIMMs are measured in bytes rather than bits. SIMMs are easier to install than individual memory chips. webopedia.com
DIMM Short for dual in-line memory module, a small circuit board that holds memory chips. A single in-line memory module (SIMM) has a 32-bit path to the memory chips whereas a DIMM has 64-bit path. Because the Pentium processor requires a 64-bit path to memory, you need to install SIMMs two at a time. With DIMMs, you can install memory one DIMM at a time. webopedia.com
RAM Pronounced ramm, acronym for random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers. webopedia.com
COM1 In DOS systems, the name of a serial communications port. DOS supports four serial ports: COM1, COM2, COM3, and COM4. However, most software uses system interrupts to access the serial ports, and there are only two IRQ lines reserved. This means that the four COM ports share the same two IRQ lines. webopedia.com
ROM Pronounced rahm, acronym for read-only memory, computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read. webopedia.com
RF Short for radio frequency, any frequency within the electromagnetic spectrum associated with radio wave propagation. Webopedia.com
IR Abbreviated as IR, infrared is a wave of light that in the area beyond the visible part of the color spectrum. While it is invisible to human eye infrared is often used to enhance visibility when using night vision devices. Webopedia.com
IDE Abbreviation of either Intelligent Drive Electronics or Integrated Drive Electronics, depending on who you ask. An IDE interface is an interface for mass storage devices, in which the controller is integrated into the disk or CD-ROM drive. Webopedia.com
Desktop In graphical user interfaces, a desktop is the metaphor used to portray file systems. Such a desktop consists of pictures, called icons, that show cabinets, files, folders, and various types of documents (that is, letters, reports, pictures). webopedia.com

- Software -

Word Definition Citation
Font A design for a set of characters. A font is the combination of typeface and other qualities, such as size, pitch, and spacing. For example, Times Roman is a typeface that defines the shape of each character. Within Times Roman, however, there are many fonts to choose from -- different sizes, italic, bold, and so on. (The term font is often used incorrectly as a synonym for typeface.) webopedia.com
Font Family A set of fonts all with the same typeface, but with different sizes, weights and slants. webopedia.com
Sans Serif Pronounced SAN-SERR-if. A category of typefaces that do not use serifs, small lines at the ends of characters. Popular sans serif fonts include Helvetica, Avant Garde, Arial, and Geneva. Serif fonts include Times Roman, Courier, New Century Schoolbook, and Palatino. webopedia.com
Serif A small decorative line added as embellishment to the basic form of a character. Typefaces are often described as being serif or sans serif (without serifs). The most common serif typeface is Times Roman. A common sans serif typeface is Helvetica. webopedia.com
Italic/Oblique In typography, italic refers to fonts with characters slanted to the right. An italic font, however, often includes one or more character shapes, such as the a and the f, that differ from those in the roman font of the same family. webopedia.com
Mono-Spaced In a monospaced font, each character has the same width. Non-graphics display screens, display text in a monospaced font. Almost all printers, with the exception of line printers, are able to print with either proportionally spaced or monospaced fonts. webopedia.com
Proporionally Spaced Using different widths for different characters. In a proportionally spaced font, the letter I is narrower than the letter q and the letter m wider. This book uses a proportionally spaced font, as do most books, magazines, and newspapers. webopedia.com
Point In typography, a point is about 1/72 of an inch and is used to measure the height of characters. (Historically, a point was.0138 inches, a little less than 1/72 of an inch, but this has changed.) webopedia.com
Character In computer software, any symbol that requires one byte of storage. This includes all the ASCII and extended ASCII characters, including the space character. In character-based software, everything that appears on the screen, including graphics symbols, is considered to be a character. In graphics-based applications, the term character is generally reserved for letters, numbers, and punctuation. webopedia.com
Binary number Computers are based on the binary numbering system, which consists of just two unique numbers, 0 and 1. All operations that are possible in the decimal system (addition, subtraction, multiplication, division) are equally possible in the binary system. webopedia.com
Hexadecimal Refers to the base-16 number system, which consists of 16 unique symbols: the numbers 0 to 9 and the letters A to F. For example, the decimal number 15 is represented as F in the hexadecimal numbering system. The hexadecimal system is useful because it can represent every byte (8 bits) as two consecutive hexadecimal digits. It is easier for humans to read hexadecimal numbers than binary numbers. webopedia.com
Octet An octet is 8 bits. It is equivalent to a byte, as long as the byte is also 8 bits. Bytes range from 4 - 10 bits, but octets are always 8 bits. webopedia.com
FAT A table that the operating system uses to locate files on a disk. Due to fragmentation, a file may be divided into many sections that are scattered around the disk. The FAT keeps track of all these pieces. Webopedia.com
NTFS Short for NT File System, one of the file system for the Windows NT operating system (Windows NT also supports the FAT file system). NTFS has features to improve reliability, such as transaction logs to help recover from disk failures. To control access to files, you can set permissions for directories and/or individual files. NTFS files are not accessible from other operating systems such as DOS. Webopedia.com
OS The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers. Webopedia.com
Driver A program that controls a device. Every device, whether it be a printer, disk drive, or keyboard, must have a driver program. Many drivers, such as the keyboard driver, come with the operating system. Webopedia.com
Virtual Memory An imaginary memory area supported by some operating systems (for example, Windows but not DOS) in conjunction with the hardware. You can think of virtual memory as an alternate set of memory addresses. Programs use these virtual addresses rather than real addresses to store instructions and data. When the program is actually executed, the virtual addresses are converted into real memory addresses. Webopedia.com
Fragmentation Refers to the condition of a disk in which files are divided into pieces scattered around the disk. Fragmentation occurs naturally when you use a disk frequently, creating, deleting, and modifying files. At some point, the operating system needs to store parts of a file in noncontiguous clusters. This is entirely invisible to users, but it can slow down the speed at which data is accessed because the disk drive must search through different parts of the disk to put together a single file. Webopedia.com
Virtual Machine A self-contained operating environment that behaves as if it is a separate computer. For example, Java applets run in a Java virtual machine (VM) that has no access to the host operating system. Webopedia.com
Availability refers to the availability of resources in a computer system, in the wake of component failures in the system. Webopedia.com
ASP Abbreviated as ASP, a third-party entity that manages and distributes software-based services and solutions to customers across a wide area network from a central data center. In essence, ASPs are a way for companies to outsource some or almost all aspects of their information technology needs. They may be commercial ventures that cater to customers, or not-for-profit or government organizations, providing service and support to end users. Webopedia.com

- Security -

Word Definition Citation
Brute Force Refers to a programming style that does not include any shortcuts to improve performance, but instead relies on sheer computing power to try all possibilities until the solution to a problem is found. A classic example is the traveling salesman problem (TSP). Suppose a salesman needs to visit 10 cities across the country. How does one determine the order in which cities should be visited such that the total distance traveled is minimized? The brute force solution is simply to calculate the total distance for every possible route and then select the shortest one. This is not particularly efficient because it is possible to eliminate many possible routes through clever algorithms. Webopedia.com
Phishing The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information. Webopedia.com
Worm A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down. Webopedia.com
VPN Short for virtual private network, a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. Webopedia.com
PGP Abbreviated as PGP, a technique developed by Philip Zimmerman for encrypting messages. PGP is one of the most common ways to protect messages on the Internet because it is effective, easy to use, and free. PGP is based on the public-key method, which uses two keys -- one is a public key that you disseminate to anyone from whom you want to receive a message. The other is a private key that you use to decrypt messages that you receive. Webopedia.com
Audit Log To record an action. For example, to enter a record into a log file. Webopedia.com
Buffer Overflow The condition wherein the data transferred to a buffer exceeds the storage capacity of the buffer and some of the data “overflows” into another buffer, one that the data was not intended to go into. Since buffers can only hold a specific amount of data, when that capacity has been reached the data has to flow somewhere else, typically into another buffer, which can corrupt data that is already contained in that buffer. Webopedia.com
Logic Bomb Also called slag code, programming code added to the software of an application or operating system that lies dormant until a predetermined period of time (i.e., a period of latency) or event occurs, triggering the code into action. Logic bombs typically are malicious in intent, acting in the same ways as a virus or Trojan horse once activated. In fact, viruses that are set to be released at a certain time are considered logic bombs. They can perform such actions as reformatting a hard drive and/or deleting, altering or corrupting data. Webopedia.com
Social Engineering In the realm of computers, the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information. Social engineering is successful because its victims innately want to trust other people and are naturally helpful. The victims of social engineering are tricked into releasing information that they do not realize will be used to attack a computer network. For example, an employee in an enterprise may be tricked into revealing an employee identification number to someone who is pretending to be someone he trusts or representing someone he trusts. While that employee number may not seem valuable to the employee, which makes it easier for him to reveal the information in the first place, the social engineer can use that employee number in conjunction with other information that has been gathered to get closer to finding a way into the enterprise’s network. Webopedia.com
Strong Passwords A password that is difficult to detect by both humans and computer programs, effectively protecting data from unauthorized access. A strong password consists of at least six characters (and the more characters, the stronger the password) that are a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are typically case-sensitive, so a strong password contains letters in both uppercase and lowercase. Strong passwords also do not contain words that can be found in a dictionary or parts of the user’s own name. Webopedia.com
Confidentiality spoken, written, acted on, etc., in strict privacy or secrecy; secret: a confidential remark. Dictionary.com
Authentication The process of identifying an individual, usually based on a username and password. In security systems, authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual. Webopedia.com
Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. Webopedia.com
Firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Webopedia.com
Spam Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e-mail. However, if a long-lost brother finds your e-mail address and sends you a message, this could hardly be called spam, even though it's unsolicited. Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup. Webopedia.com
PKI Short for public key infrastructure, a system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction. PKIs are currently evolving and there is no single PKI nor even a single agreed-upon standard for setting up a PKI. However, nearly everyone agrees that reliable PKIs are necessary before electronic commerce can become widespread. Webopedia.com
Integrity a sound, unimpaired, or perfect condition: the integrity of hard drive data. Dictionary.com
Encryption The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text. Webopedia.com

- Network -

Word Definition Citation
Bridge A device that connects two local-area networks (LANs), or two segments of the same LAN that use the same protocol, such as Ethernet or Token-Ring. Webopedia.com
SMS gateway An SMS gateway is placed between two SMSCs, acting as a relay between the two SMSCs. It is able to translate one SMSC protocol to another, and can be used by two different wireless carriers to interconnect their SMSCs. Webopedia.com
Modem Short for modulator-demodulator. A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Webopedia.com
Net Neutrality Network neutrality or net neutrality, as it is abbreviated, is the term used to describe networks that are open to equal access to all . They are non-discriminatory as they do not favor any one destination or application over another. webopedia.com
peer-to-peer Often referred to simply as peer-to-peer, or abbreviated P2P, a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures, in which some computers are dedicated to serving the others. Peer-to-peer networks are generally simpler, but they usually do not offer the same performance under heavy loads. Webopedia.com
ftp Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer. FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server). Webopedia.com
Broadband A type of data transmission in which a single medium (wire) can carry several channels at once. Cable TV, for example, uses broadband transmission. In contrast, baseband transmission allows only one signal at a time. Webopedia.com
fileserver In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive. Wikipedia.org
LAN A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN). Most LANs connect workstations and personal computers. Each node (individual computer ) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-mail or engaging in chat sessions. Webopedia.com
Ethernet A local-area network (LAN) architecture developed by Xerox Corporation in cooperation with DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer rates of 10 Mbps. The Ethernet specification served as the basis for the IEEE 802.3 standard, which specifies the physical and lower software layers. Ethernet uses the CSMA/CD access method to handle simultaneous demands. It is one of the most widely implemented LAN standards. Webopedia.com
NLR National LambdaRail is advancing the research, clinical, and educational goals of members and other institutions by establishing and maintaining a unique nationwide network infrastructure that is owned and controlled by the U.S. research community. Ownership of the underlying optical infrastructure ensures the research community unprecedented control and flexibility in meeting the requirements of the most advanced network applications and providing the resources demanded by cutting-edge network research. nlr.net
Protocols An agreed-upon format for transmitting data between two devices. The protocol determines the following:
the type of error checking to be used
data compression method, if any
how the sending device will indicate that it has finished sending a message
how the receiving device will indicate that it has received a message
Webopedia.com
TCP/IP Abbreviation of Transmission Control Protocol, and pronounced as separate letters. TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. Webopedia.com
Client/Server The client part of a client-server architecture. Typically, a client is an application that runs on a personal computer or workstation and relies on a server to perform some operations. For example, an e-mail client is an application that enables you to send and receive e-mail. Webopedia.com
Backbone The term is often used to describe the main network connections composing the Internet. Webopedia.com
Hub A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. A passive hub serves simply as a conduit for the data, enabling it to go from one device (or segment) to another. So-called intelligent hubs include additional features that enables an administrator to monitor the traffic passing through the hub and to configure each port in the hub. Intelligent hubs are also called manageable hubs. A third type of hub, called a switching hub, actually reads the destination address of each packet and then forwards the packet to the correct port. Webopedia.com
Router A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network. Routers are located at gateways, the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts. Webopedia.com
Switch In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs. Webopedia.com
Server A computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files. Any user on the network can store files on the server. A print server is a computer that manages one or more printers, and a network server is a computer that manages network traffic. A database server is a computer system that processes database queries. Servers are often dedicated, meaning that they perform no other tasks besides their server tasks. On multiprocessing operating systems, however, a single computer can execute several programs at once. A server in this case could refer to the program that is managing resources rather than the entire computer. Webopedia.com
Wireless G The word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications. Wireless networking utilizes specific equipment such as NICs, APs and routers in place of wires (copper or optical fiber) for connectivity. Webopedia.com
DNS Server Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4. The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. Webopedia.com
ISP Short for Internet Service Provider, a company that provides access to the Internet. For a monthly fee, the service provider gives you a software package, username, password and access phone number. Equipped with a modem, you can then log on to the Internet and browse the World Wide Web and USENET, and send and receive e-mail. In addition to serving individuals, ISPs also serve large companies, providing a direct connection from the company's networks to the Internet. ISPs themselves are connected to one another through Network Access Points (NAPs). Webopedia.com

- Internet -

Word Definition Citation
BLOB Short for binary large object, a collection of binary data stored as a single entity in a database management systems (DBMS). BLOBs are used primarily to hold multimedia objects such as images, videos, and sound, though they can also be used to store programs or even fragments of code. Not all DBMSs support BLOBs. Webopedia.com
URL Abbreviation of Uniform Resource Locator, the global address of documents and other resources on the World Wide Web. webopedia.com
URI Short for Uniform Resource Identifier, the generic term for all types of names and addresses that refer to objects on the World Wide Web. A URL is one kind of URI. webopedia.com
HTTP Short for HyperText Transfer Protocol, the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page. webopedia.com
ISP Short for Internet Service Provider, a company that provides access to the Internet. For a monthly fee, the service provider gives you a software package, username, password and access phone number. Equipped with a modem, you can then log on to the Internet and browse the World Wide Web and USENET, and send and receive e-mail. webopedia.com
Blog Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual. Typically updated daily, blogs often reflect the personality of the author. webopedia.com
Wiki A collaborative Web site comprises the perpetual collective work of many authors. Similar to a blog in structure and logic, a wiki allows anyone to edit, delete or modify content that has been placed on the Web site using a browser interface, including the work of previous authors. In contrast, a blog, typically authored by an individual, does not allow visitors to change the original posted material, only add comments to the original content. webopedia.com
ASCII Acronym for the American Standard Code for Information Interchange. Pronounced ask-ee, ASCII is a code for representing English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another. webopedia.com
BitTorrent BitTorrent is a file distribution system used for transferring files across a network of people. As you download a file, BitTorrent places what you download on upload for other users; when multiple people are downloading the same file at the same time they upload pieces of the file to each other. BitTorrent pieces together the file you are downloading, to where the first part of a file you get may be the last part someone else gets. As you continue to retrieve the file, BitTorrent also uploads data to other users. For example, a person with 98 percent of the file done is directed to the people with the 2 percent of the file they still need. Webopedia.com
SGML Short forStandard Generalized Markup Language, a system for organizing and tagging elements of a document. SGML was developed and standardized by the International Organization for Standards (ISO) in 1986. SGML itself does not specify any particular formatting; rather, it specifies the rules for tagging elements. These tags can then be interpreted to format elements in different ways. Webopedia.com
W3C Short for World Wide Web Consortium, an international consortium of companies involved with the Internet and the Web. The W3C was founded in 1994 by Tim Berners-Lee, the original architect of the World Wide Web. The organization's purpose is to develop open standards so that the Web evolves in a single direction rather than being splintered among competing factions. Webopedia.com

- Coding -

Word Definition Citation
SGML Short forStandard Generalized Markup Language, a system for organizing and tagging elements of a document. SGML was developed and standardized by the International Organization for Standards (ISO) in 1986. SGML itself does not specify any particular formatting; rather, it specifies the rules for tagging elements. These tags can then be interpreted to format elements in different ways. webopedia.com
HTML Short for HyperText Markup Language, the authoring language used to create documents on the World Wide Web. HTML is similar to SGML, although it is not a strict subset. webopedia.com
XML Short for Extensible Markup Language, a specification developed by the W3C. XML is a pared-down version of SGML, designed especially for Web documents. It allows designers to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations. webopedia.com
XHTML Short for Extensible Hypertext Markup Language, a hybrid between HTML and XML specifically designed for Net device displays. webopedia.com
/ The backslash ( \ ) is a typographical mark (glyph) used chiefly in computing. It was first introduced in 1960 by Bob Bemer. Sometimes called a reverse solidus, it is the mirror image of the common slash. It is also known as a slosh. In colloquial speech, it is sometimes called a whack (however that term is considered to be properly a synonym only for the forward slash). Wikipedia.org
\ A slash or stroke, /, is a punctuation mark. It is also called an oblique, diagonal, whack, separatrix, virgule, scratch comma, slant, or forward slash. It appears similar to a solidus or shilling mark, which is a separate character. Wikipedia.org
& An ampersand (&), also commonly called an "and sign" is a logogram representing the conjunction "and." The symbol is a ligature of the letters in et, Latin for "and." Its origin is apparent in the second example in the image to the left below; the first example, now more common, is a later development. Wikipedia.org
~ The tilde (~) is a grapheme with several uses. The name of the character comes from Spanish, from the Latin titulus meaning a title or superscription, and is pronounced til-de. It was originally written over a letter as a mark of abbreviation, but has since acquired a number of other uses as a diacritic mark or a character in its own right. In the latter capacity (especially in lexicography) A tilde is sometimes confused with a swung dash which is used in dictionaries to indicate the omission of a word. Occasionally the tilde is called a twiddle or similar word that describes its shape. Wikipedia.org
@ Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user’s name from the user’s domain name, both of which are necessary in order to transmit e-mails. Webopedia.com
CVS Short for Concurrent Versions System, an open-source, network-transparent program that allows developers to keep track of different development versions of source code. CVS does not maintain multiple versions of source code files but keeps a single copy and records of all of the changes that are made. When a developer wants a particular development version of a file, CVS will reconstruct that version based on its records. Webopedia.com
Deprecated Used typically in reference to a computer language to mean a command or statement in the language that is going to be made invalid or obsolete in future versions. Webopedia.com
Attribute A language construct that programmers use to add additional information (i.e., metadata) to code elements (e.g., assemblies, modules, members, types, return values, and parameters) to extend their functionality. Webopedia.com
Element Video or audio streams that are not multiplexed together as a single file. The format of the elementary stream depends upon the codec or data carried in the stream. Webopedia.com
DTD Short for document type definition. A DTD states what tags and attributes are used to describe content in an SGML, XML or HTML document, where each tag is allowed, and which tags can appear within other tags. For example, in a DTD one could say that LIST tags can contain ITEM tags, but ITEM tags cannot contain LIST tags. In some editors, when authors are inputting information, they can place tags only where the DTD allows. This ensures that all the documentation is formatted the same way. Applications will use a document's DTD to properly read and display a document's contents. Changes in the format of the document can be easily made by modifying the DTD. Webopedia.com
Validation Verification that something is correct or conforms to a certain standard. In data collection or data entry, it is the process of ensuring that the data that are entered fall within the accepted boundaries of the application collecting the data. For example, if a program is collecting last names to be entered in a database, the program validates that only letters are entered and not numbers; or in a survey collecting data in the form of “yes” or “no” questions, the program validates that only those responses are used and not some other word. Webopedia.com
XHTML Short for Extensible Hypertext Markup Language, a hybrid between HTML and XML specifically designed for Net device displays. Webopedia.com
XML Short for Extensible Markup Language, a specification developed by the W3C. XML is a pared-down version of SGML, designed especially for Web documents. It allows designers to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations. Webopedia.com
CSS Short for Cascading Style Sheets, a new feature being added to HTML that gives both Web site developers and users more control over how pages are displayed. With CSS, designers and users can create style sheets that define how different elements, such as headers and links, appear. These style sheets can then be applied to any Web page. Webopedia.com
Frameset A type of structure that can be implemented to aid in the design of a webpage, much like a table. Webopedia.com
Transitional The Transitional and Frameset variants allow for presentational markup whereas the Strict variant encourages the use of style sheets through its omission of most presentational markup. Webopedia.com
Strict The Strict variant represents the standard proper, whereas the Transitional and Frameset variants were developed to assist in the transition from earlier versions of HTML (including HTML 3.2). Webopedia.com
Well-formed In web page design, and generally for all markup languages such as SGML, HTML, and XML, a well-formed element is one that is either:
Opened and subsequently closed
An empty element, which in that case must be terminated
Properly nested so that it does not overlap
Wikipedia.org